CSO

CSO Daily

August 19, 2019

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Your Must-Read Stories

•

More critical Remote Desktop flaws expose Windows systems to hacking

•

ICS security: Popular building management system vulnerable to takeover

•

How to check Privileged Identity management settings for Office 365

•

Beware rogue email rules and forms

•

Staffing the CISO office: A call to senior management for some expansive thinking

•

Thoughts from Defcon 27 – This is why I do what I do

White Paper: Citrix

Delivering the Future of Work – Now

The CIO’s guide to building the unified, digital workspace for today’s hybrid and multi-cloud strategies. Read more ▶

Image: More critical Remote Desktop flaws expose Windows systems to hacking

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: ICS security: Popular building management system vulnerable to takeover

ICS security: Popular building management system vulnerable to takeover

Remotely exploitable vulnerability in internet-connected devices gives attackers a means to cause disruption and damage in a wide range of industries. Read more ▶

 
 
Image: How to check Privileged Identity management settings for Office 365

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk. Read more ▶

Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it. Read more ▶

Image: Staffing the CISO office: A call to senior management for some expansive thinking

Staffing the CISO office: A call to senior management for some expansive thinking

More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization. Read more ▶

Image: Thoughts from Defcon 27 – This is why I do what I do

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the majority of the conference space. So, what makes this one of the most relevant and successful security conferences? Read more ▶

Miscellaneous: eSentire

Q1 2019 Quarterly Threat Report

Read the Q1 2019 Quarterly Threat Report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.